CN104580144A
|
|
Penetration testing method for data transmission security of wireless data transmission radio
|
CN104462228A
|
|
Semantics-based registration information security officer authentication capability evaluation method and system
|
CN104166680A
|
|
Parallel vulnerability mining method based on open source library and text mining
|
CN105022677A
|
|
USB device usage record recovery and check method
|
CN103886046A
|
|
Automatic semanteme extraction method for Web data exchange
|
CN103701886A
|
|
Hierarchic scheduling method for service and resources in cloud computation environment
|
CN103257872A
|
|
Embedded control system for computers and updating method of embedded control system
|
CN103179132A
|
|
Method and device for detecting and defending CC (challenge collapsar)
|
CN103218477A
|
|
Network viewpoint propagation and forecasting method
|
CN103118138A
|
|
Cloud service based message queue stream processing method
|
CN103268279A
|
|
Compound poisson process-based software reliability prediction method
|
CN103198013A
|
|
Loss-amount based software strong security measurement method
|
CN103049377A
|
|
Parallel symbolic execution method based on path cluster reductions
|
CN102915347A
|
|
Distributed data stream clustering method and system
|
CN102799954A
|
|
Method and system for multi-objective optimization applied to risk assessment
|
CN102799822A
|
|
Software running security measurement and estimation method based on network environment
|
CN102708054A
|
|
Detection method for security flaws in loop write-only memory of binary program
|
CN102708153A
|
|
Self-adaption finding and predicting method and system for hot topics of online social network
|
CN103366120A
|
|
Bug attack graph generation method based on script
|
CN102411690A
|
|
Safety loophole mining method and device of application software under Android platform
|